—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-4652-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 04, 2020 https://www.debian.org/security/faq
– ————————————————————————-
Package : gnutls28
CVE ID : CVE-2020-11501
Debian Bug : 955556
A flaw was reported in the DTLS protocol implementation in GnuTLS, a
library implementing the TLS and SSL protocols. The DTLS client would
not contribute any randomness to the DTLS negotiation, breaking the
security guarantees of the DTLS protocol.
For the stable distribution (buster), this problem has been fixed in
version 3.6.7-4+deb10u3.
We recommend that you upgrade your gnutls28 packages.
For the detailed security status of gnutls28 please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/gnutls28
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=EtrY
—–END PGP SIGNATURE—–